Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
db914ac1875224c9d32b20dfe784ec6c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
db914ac1875224c9d32b20dfe784ec6c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db914ac1875224c9d32b20dfe784ec6c_JaffaCakes118.html
-
Size
26KB
-
MD5
db914ac1875224c9d32b20dfe784ec6c
-
SHA1
f7cab679c1a91beee9c324064504662599aee08c
-
SHA256
8cdeb4980e5b8e60e1819095c7bc1571cf48a53ba5ed9aa8ea0c0b637b2206ad
-
SHA512
ef9df03438dc43029457006be96dcd9a260ea1aa58661507b30b4cc59944634d8cab3e4203a5e18ab92a46a1d494bdf1bb687783093a3db48d058351e9712e14
-
SSDEEP
768:/I1hpKVAqnd+qi9q7B2Ea17ZgQHx+2gDxn:/I17KVhnd+LABza17ZgUxa
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 868 msedge.exe 868 msedge.exe 4932 msedge.exe 4932 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4932 msedge.exe 4932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4932 wrote to memory of 2936 4932 msedge.exe 83 PID 4932 wrote to memory of 2936 4932 msedge.exe 83 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 5048 4932 msedge.exe 84 PID 4932 wrote to memory of 868 4932 msedge.exe 85 PID 4932 wrote to memory of 868 4932 msedge.exe 85 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86 PID 4932 wrote to memory of 544 4932 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\db914ac1875224c9d32b20dfe784ec6c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90a0446f8,0x7ff90a044708,0x7ff90a0447182⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,13817301877549560593,14836761892750121490,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,13817301877549560593,14836761892750121490,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,13817301877549560593,14836761892750121490,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13817301877549560593,14836761892750121490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,13817301877549560593,14836761892750121490,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,13817301877549560593,14836761892750121490,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
396B
MD581ac25dca7d60be3d8590d75a53da4ab
SHA1103b96ce86c168ed537128a5ee9e6626ba2fb439
SHA256b759131003139019cde9b1a8b67dd3b868f4c5b22d0cfe7b78a9eb8eb43136a8
SHA5122779ccde37496a453664291316443cc44daed71b141fb6acc10ad2a946e593848f615c599891113db82388d45e5f5f91d6555996ed34978b8c1b4833a6c2e084
-
Filesize
5KB
MD58812b8a84beae7ae7b40406a931471d9
SHA1a96a2aeed2d3024d4331be6fcde78f9f1f8cec37
SHA256ed4cc81e220d6c43021d738dfc7d9e8f60c617dd2b361a8c1300dd2e1e9db24b
SHA5123cc18a14ec301773469f37dff50fa2024bc30a7fc5e307abf797c29f1fdd79956c8aae4c2beaa16b91590f17746388384eb3a9b18049d6a9652dabbe65954480
-
Filesize
6KB
MD59605eb2a936c7504ccc5c6d792b305c8
SHA109f293e1cc30b3a879177bef5ef24943dc440a92
SHA2567d66f8bdd328c5168aace3e5d1532607885026a6e509da76f17e93cd8676f218
SHA512f2215a86d4d93e07def00fbf457411162fdc0848db271bfe8cf87805312bf2d3f498700b9274157f36e8146d624c7b15bd41ec4b55ba9c5f155cd5161fddd56a
-
Filesize
10KB
MD58d80159993af3aad56111ba5341de548
SHA1ab4347685810475419a7fd86b8667a597d0d996d
SHA25687deaad9d1bba7928bf8ad7decbef0cadcabe4bb8a03ef051868cd57fb69d394
SHA51272982975b617029e8aa050922345faf84c966029ba225d18af964b392596b1eb355131ef6107852e6bf1ee446b5d98df0e68c9870bdfc68c7d668e0104dcf592